Botnets
Network of computers infected by malicious code
C2 is a control server or machine that relays with individual bots
Extract info, Ddos, etc
APT
Targeted at individual organizations
Low and slow
Unique
Malware analysis
Static - what would happen if executed
Dynamic
Viruses, backdoors, logic bombs, Trojan horses, worms
Virus - infect program by modifying it and then self copy
Backdoor - secret entry point into program or system
Logic bomb - wait and perform malicious activity when activated
Trojan horse - hidden in useful program, executes when main program is run
Worm - use network connections to spread, exploiting vulnerability